Networking Security


Consider Data Security

Consider Data Security

Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.

Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.

How to Protect Your Business from Amazon

How to Protect Your Business from Amazon

If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.

Your Top Data-Exposure Risk: Employees

People are fallible creatures. As the saying goes, nobody’s perfect.

Cybersecurity Challenges

Cybersecurity Challenges

Healthcare institutions face a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data

A Browsing Challenge

A Browsing Challenge

Google Chrome is largely considered one of the most security-conscious browsers, but recent headlines revealed some of its weaknesses.

Flying Under the Radar

Flying Under the Radar

With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.

Just Say “Yes” to the Cloud

Just Say “Yes” to the Cloud

Cloud technology began with the concept of grid computing— the idea that we could replicate the way a power grid in a country was set up.



Choosing the Right VMS for Your Business

Choosing the Right VMS for Your Business

Since every business is unique, it comes as no surprise that each has different security needs.

Automated Critical Security

Automated Critical Security

Thousands of people pour into and out of high-rise office buildings each day, and each must be kept safe and secure.

A Good Endpoint

Most of the malicious or criminal activity targeting today’s enterprises involves the endpoint. Insecure endpoints are an expensive risk and difficult to address.

Going All Out

Going All Out

When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.

The Cost of Cybercrime

The Cost of Cybercrime

Cybercrime is a large and dangerous business and it impacts individuals, businesses and governments worldwide.

Locking the Cabinet

Locking the Cabinet

Providing independent consulting, best-inclass products, hosting solutions and financial services to more than 1,000 U.S.- and Canada-based companies, Forsythe is one of the largest independent IT integrators in North America.

Know Your Enemy

Like it or not, every time you spend time on the keyboard, there may be someone watching your every keystroke. It wouldn’t hurt if you knew your enemy; and it certainly would be beneficial if you knew who was on your side.

Why Do Commonly Used Security Measures Fail

Why Do Commonly Used Security Measures Fail

Information security is defined as a reactive activity, as it involves managing risks that may have a serious effect on the organization if they occur.

A Balancing Act

A Balancing Act

Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis.

Four Video Storage Trends to Watch

Four Video Storage Trends to Watch

Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.

A Case of Security

The New Hampshire Liquor Commission (NHLC) experienced a record-breaking fiscal year in 2016. With the increase of business, and the addition of three more state-run stores, the state commission felt it was time to improve on security solutions. Enter Griffon Security Technologies.

Moving the Discussion Forward

Moving the Discussion Forward

Only a few years ago, the inevitable shift to all things Cloud was met with guarded optimism. But today, the shift is really happening.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.